Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method and system based on biological characteristics and memory medium

An identity authentication and biometric technology, applied in transmission systems, digital transmission systems, and key distribution, can solve the problems of huge data volume, reducing identification efficiency, and increasing computational complexity.

Active Publication Date: 2017-11-07
武汉真元生物数据有限公司
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] ① Regardless of whether the database used to store personal biometric templates (or samples) is used for industrial applications or general commercial use, users will become more and more sensitive to the passive collection and storage of personal privacy information with the development of society. Buried policy hidden dangers
[0006] ② Regardless of whether the database used to store personal biometric templates (or samples) is built on the background server or on the terminal device, it is facing the problem of being stolen, especially the easily lost terminal device
[0010] ③ The types of biometric features collected by various biometric authentication applications are different, and can be one or more of fingerprints, faces, irises, finger veins, etc.; at the same time, various biometric authentication applications use biometric templates to obtain templates (or The method of feature sequence of sample) is different, which determines that the algorithms in various biometric authentication applications are very different, which also determines that the data types of various biometric feature sequences are complicated, and the calculation complexity is increased on the basis of a huge amount of data. , which reduces the identification efficiency and is not conducive to the unification and popularization of biometric authentication applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system based on biological characteristics and memory medium
  • Identity authentication method and system based on biological characteristics and memory medium
  • Identity authentication method and system based on biological characteristics and memory medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0083] The first embodiment of the present invention provides a biometric-based identity authentication method. The biometric-based identity authentication method includes a registration step and an authentication step:

[0084] see figure 1 As shown, the registration steps include:

[0085] A1, obtain the identity information of the registered user, and reconstruct the identity information of the registered user according to the preset reconstruction rules;

[0086] First, confirm a set of data IDs that can uniquely identify the identity information of a registered user, such as ID number and its transformation form (such as the combination of name and ID number), passport number and its transformation form (such as name and passport number Combination), unit employee serial number and its transformation form (such as the combination of nam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method based on biological characteristics and relates to the technical field of biological characteristic data processing. The method comprises the steps of obtaining and reconstructing identity information of a registered user; collecting biological characteristic information of the registered user and generating biological characteristic data; through adoption of a preset key generation method, generating an encryption key through utilization of the biological characteristic data of the registered user; encrypting the reconstructed identity information through utilization of the encryption key, thereby generating a ciphertext; collecting the biological characteristic information of a to-be-authenticated user and generating the biological characteristic data; generating a decryption key through utilization of the biological characteristic data of the to-be-authenticated user; decrypting the ciphertext through utilization of the decryption key and generating a plurality of pieces of decrypted data; and screening the decrypted data consistent with a reconstruction rule, carrying out reverse reconstruction to generate to-be-identified data, screening the to-be-identified data with the highest occurrence frequency as the identity information of the to-be-authenticated user, and judging the user as the registered user. The invention also discloses another identity authentication method based on the biological characteristics.

Description

technical field [0001] The present invention relates to the technical field of biometric data processing, in particular to a biometric-based identity authentication method, storage medium and system. Background technique [0002] At present, traditional identity authentication methods based on biometrics are generally divided into two steps: registration and authentication. In the registration process, the user's biometric information, such as fingerprints, faces, irises, finger veins, etc., is collected, and a specific algorithm is used to extract the template feature sequence, and the user's template feature sequence is stored in the database for user identity authentication. . In the authentication process, the biometric information corresponding to the user is collected, such as fingerprints, faces, irises, finger veins, etc., and the same algorithm is used to extract the sample feature sequence, and the sample feature sequence is compared with the template feature sequ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0861H04L9/0894H04L63/0407H04L63/0815H04L63/0861
Inventor 舒翔
Owner 武汉真元生物数据有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products